Search Results - (( location detection system algorithm ) OR ( label classification system algorithm ))

Refine Results
  1. 1

    Transformer-Based Model for Malicious URL Classification by Do N.Q., Selamat A., Lim K.C., Krejcar O., Ghani N.A.M.

    Published 2024
    Subjects: “…Malicious uniform resource locator classification…”
    Conference Paper
  2. 2
  3. 3

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Performances of machine learning algorithms for binary classification of network anomaly detection system by Nawir, M., Amir, A., Lynn, O.B., Yaakob, N., Ahmad, R.B.

    Published 2018
    “…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad by Ahmad, Nurul Atirah

    Published 2023
    “…It is set to label since it has no label class. The classification is set to two categories: Eligible or Ineligible. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout by Dzakiyullah, Nur Rachman

    Published 2025
    “…Seven machine learning models—Artificial Neural Network (ANN), Random Forest (RF), Decision Tree (DTT), k-Nearest Neighbors (k-NN), Naïve Bayes (NB), Support Vector Machine (SVM), and Deep Neural Network (DNN)—were used for multi-label classification of the complications. The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Classification of JPEG files by using extreme learning machine by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
    Get full text
    Get full text
    Article
  9. 9

    VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING by ONG KANG WEI, ONG KANG WEI, LOH SER LEE, LOH SER LEE

    Published 2022
    “…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Car plate detection system by Gunasegaran, Krishnan

    Published 2005
    “…This is because if the system fails to detect the location of the car plate, then the whole system is a failure because recognition can only be done after successful plate location. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Extreme learning machine classification of file clusters for evaluating content-based feature vectors by Ali, Rabei Raad, Mohamad, Kamaruddin Malik, Jamel, Sapiee, Ahmad Khalid, Shamsul Kamal

    Published 2018
    “…The files are allocated in a continuous series of clusters. The ELM algorithm is applied to the DFRWS (2006) dataset and the results show that the combination of the three methods produces 93.46% classification accuracy.…”
    Get full text
    Article
  12. 12

    Face detection and stereo matching algorithms for smart surveillance system with IP cameras by Abd Manap, Nurulfajar

    Published 2010
    “…The research consists of algorithm development in surveillance system including face detection, stereo matching, location estimation and implementation with ACTi PTZ camera. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Diagnostic And Classification System For Kids With Learning Disabilities by Rehman, Ullah Khan, Julia Ai Cheng, Lee, Yin, Bee Oon

    Published 2017
    “…In this research, we propose an automated diagnostic and classification system. The system is trained by pre-classified data of 857 school children scores in spelling and reading. …”
    Get full text
    Get full text
    Proceeding
  14. 14
  15. 15
  16. 16

    Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling by Zulaiha Ali Othman, Afaf Muftah Adabashi, Suhaila Zainudin, Saadat M. Al Hashmi

    Published 2011
    “…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. However, numerous data mining techniques have been successfully applied in this area to find intrusions hidden in large amounts of audit data through classification, clustering or association rule. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Development of vehicle counting system by using background subtraction technique / Muhammad Fadhli Md Azemin by Md Azemin, Muhammad Fadhli

    Published 2018
    “…With a view to improvement, it is proposed to develop a unique algorithm for vehicle classification and counting using Gaussian Mixture Model (GMM) and blob analysis method. …”
    Get full text
    Get full text
    Student Project
  19. 19

    A comparative study in classification techniques for unsupervised record linkage model by Ektefa, Mohammadreza, Sidi, Fatimah, Ibrahim, Hamidah, A. Jabar, Marzanah, Memar, Sara

    Published 2011
    “…In order to utilize the supervised classification algorithms without consuming a lot of time for labeling data manually, a two step method which selects the training data automatically has been proposed in previous studies. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi by Sherksi, Nasereddin Ibrahim

    Published 2020
    “…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
    Get full text
    Get full text
    Thesis